Engineering Sciences/NOLTA-Information Security(Date:2003/11/07)

Presentation
表紙

,  

[Date]2003/11/7
[Paper #]
目次

,  

[Date]2003/11/7
[Paper #]
Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability

Shoichi HIROSE,  

[Date]2003/11/7
[Paper #]ISEC2003-77,OIS2003-54
Efficient exponentiation on Hyperelliptic Curves with Genus two

Hiroaki MORIMOTO,  Atsuko MIYAJI,  

[Date]2003/11/7
[Paper #]ISEC2003-78,OIS2003-55
Strongly Non-Separable Encryption Mode for Throwing a Media Away

Hidenori KUWAKADO,  Hatsukazu TANAKA,  

[Date]2003/11/7
[Paper #]ISEC2003-79,OIS2003-56
Comments on Improved Peyravian-Zunic's Password Authentication Schemes

Takasuke TSUJI,  Akihiro SHIMIZU,  

[Date]2003/11/7
[Paper #]ISEC2003-80,OIS2003-57
Privacy Protection using Universal Re-encryption in RFID Tags

Junichiro SAITO,  Kouichi SAKURAI,  

[Date]2003/11/7
[Paper #]ISEC2003-81,OIS2003-58
A report on CRYPTO 2003

Tetsu IWATA,  Akira OTSUKA,  Eiji OKAMOTO,  Takeshi OKAMOTO,  Mitsuru KAWAZOE,  Makoto SUGITA,  

[Date]2003/11/7
[Paper #]ISEC2003-82,OIS2003-59
A Report on SAC2003

Mitsuru MATSUI,  

[Date]2003/11/7
[Paper #]ISEC2003-83,OIS2003-60
奥付

,  

[Date]2003/11/7
[Paper #]
複写される方へ

,  

[Date]2003/11/7
[Paper #]